Stop the war!
Остановите войну!
for scientists:
default search action
IEEE Transactions on Information Forensics and Security, Volume 19
Volume 19, 2024
- Xu Song, Saihui Hou, Yan Huang, Chunshui Cao, Xu Liu, Yongzhen Huang, Caifeng Shan:
Gait Attribute Recognition: A New Benchmark for Learning Richer Attributes From Human Gait Patterns. 1-14 - Dongxia Huang, Weiqi Luo, Minglin Liu, Weixuan Tang, Jiwu Huang:
Steganography Embedding Cost Learning With Generative Multi-Adversarial Network. 15-29 - Qiang Zhou, Liangmin Wang, Huijuan Zhu, Tong Lu, Victor S. Sheng:
WF-Transformer: Learning Temporal Features for Accurate Anonymous Traffic Identification by Using Transformer Networks. 30-43 - Ju Jia, Siqi Ma, Yang Liu, Lina Wang, Robert H. Deng:
A Causality-Aligned Structure Rationalization Scheme Against Adversarial Biased Perturbations for Graph Neural Networks. 59-73 - Guoxin Sun, Tansu Alpcan, Benjamin I. P. Rubinstein, Seyit Camtepe:
To Act or Not to Act: An Adversarial Game for Securing Vehicle Platoons. 163-177 - Jiangyi Deng, Xiaoyu Ji, Beibei Wang, Bin Wang, Wenyuan Xu:
Dr. Defender: Proactive Detection of Autopilot Drones Based on CSI. 194-206 - Xinyu Tang, Cheng Guo, Kim-Kwang Raymond Choo, Yi-Ning Liu:
An Efficient and Dynamic Privacy-Preserving Federated Learning System for Edge Computing. 207-220 - Yi Ding, Zi Wang, Zhen Qin, Erqiang Zhou, Guobin Zhu, Zhiguang Qin, Kim-Kwang Raymond Choo:
Backdoor Attack on Deep Learning-Based Medical Image Encryption and Decryption Network. 280-292 - Dandan Xu, Kai Chen, Miaoqian Lin, Chaoyang Lin, Xiaofeng Wang:
AutoPwn: Artifact-Assisted Heap Exploit Generation for CTF PWN Competitions. 293-306 - Xiangye Wei, Liming Xiu, Yimao Cai:
A Perspective of Using Frequency-Mixing as Entropy in Random Number Generation for Portable Hardware Cybersecurity IP. 320-333 - Xiao Sui, Sisi Duan, Haibin Zhang:
BG: A Modular Treatment of BFT Consensus Toward a Unified Theory of BFT Replication. 44-58 - Rui Xue, Kaiping Xue, Bin Zhu, Xinyi Luo, Tianwei Zhang, Qibin Sun, Jun Lu:
Differentially Private Federated Learning With an Adaptive Noise Mechanism. 74-87 - Qian Ren, Yue Li, Yingjun Wu, Yuchen Wu, Hong Lei, Lei Wang, Bangdao Chen:
DeCloak: Enable Secure and Cheap Multi-Party Transactions on Legacy Blockchains by a Minimally Trusted TEE Network. 88-103 - Yinshan Li, Hua Ma, Zhi Zhang, Yansong Gao, Alsharif Abuadbba, Minhui Xue, Anmin Fu, Yifeng Zheng, Said F. Al-Sarawi, Derek Abbott:
NTD: Non-Transferability Enabled Deep Learning Backdoor Detection. 104-119 - Shuting He, Weihua Chen, Kai Wang, Hao Luo, Fan Wang, Wei Jiang, Henghui Ding:
Region Generation and Assessment Network for Occluded Person Re-Identification. 120-132 - Qingjun Yuan, Gaopeng Gou, Yanbei Zhu, Yuefei Zhu, Gang Xiong, Yongjuan Wang:
MCRe: A Unified Framework for Handling Malicious Traffic With Noise Labels Based on Multidimensional Constraint Representation. 133-147 - Haiwei Wu, Jiantao Zhou, Xinyu Zhang, Jinyu Tian, Weiwei Sun:
Robust Camera Model Identification Over Online Social Network Shared Images via Multi-Scenario Learning. 148-162 - Haoheng Yuan, Yanghe Feng, Chuanchuan Yang, Zhuojun Zhuang, Bin Dai:
Two-User Gaussian Broadcast Wiretap Channel With Common Message and Feedback: Revisit. 178-193 - Chen Zhang, Yulong Ming, Mingyue Wang, Yu Guo, Xiaohua Jia:
Encrypted and Compressed Key-Value Store With Pattern-Analysis Security in Cloud Systems. 221-234 - Weize Quan, Pengfei Deng, Kai Wang, Dong-Ming Yan:
CGFormer: ViT-Based Network for Identifying Computer-Generated Images With Token Labeling. 235-250 - Ningbin Yang, Chunming Tang, Debiao He:
A Lightweight Certificateless Multi-User Matchmaking Encryption for Mobile Devices: Enhancing Security and Performance. 251-264 - Weisong Zhao, Xiangyu Zhu, Kaiwen Guo, Haichao Shi, Xiaoyu Zhang, Zhen Lei:
Masked Face Transformer. 265-279 - Wenli Sun, Xinyang Jiang, Shuguang Dou, Dongsheng Li, Duoqian Miao, Cheng Deng, Cairong Zhao:
Invisible Backdoor Attack With Dynamic Triggers Against Person Re-Identification. 307-319 - Meng Li, Zheng Pei, Yong Chen, Zhenhai Miao:
Fuzzy Linguistic Knowledge Reasoning-Based Secure Control for Connected Nonlinear Servosystem. 334-343 - Yuankun Xie, Haonan Cheng, Yutian Wang, Long Ye:
Domain Generalization via Aggregation and Separation for Audio Deepfake Detection. 344-358 - Saeed Abdolinezhad, Lukas Zimmermann, Axel Sikora:
Output Positioning to Derive Maximum Entropy From Physical Unclonable Functions. 359-371 - Min Xu, Ximiao Zhang, Xiuzhuang Zhou:
Confidence-Calibrated Face and Kinship Verification. 372-384 - Andrea Montibeller, Fernando Pérez-González:
An Adaptive Method for Camera Attribution Under Complex Radial Distortion Corrections. 385-400 - Zhiqing Guo, Zhenhong Jia, Liejun Wang, Dewang Wang, Gaobo Yang, Nikola K. Kasabov:
Constructing New Backbone Networks via Space-Frequency Interactive Convolution for Deepfake Detection. 401-413 - Youwen Zhu, Yiran Cao, Qiao Xue, Qihui Wu, Yushu Zhang:
Heavy Hitter Identification Over Large-Domain Set-Valued Data With Local Differential Privacy. 414-426 - Gaoyang Liu, Tianlong Xu, Rui Zhang, Zixiong Wang, Chen Wang, Ling Liu:
Gradient-Leaks: Enabling Black-Box Membership Inference Attacks Against Machine Learning Models. 427-440 - Zhenyu Zhou, Ajay Kumar:
Finger-Knuckle Assisted Slap Fingerprint Identification System for Higher Security and Convenience. 441-454 - Huming Qiu, Hua Ma, Zhi Zhang, Alsharif Abuadbba, Wei Kang, Anmin Fu, Yansong Gao:
Toward a Critical Evaluation of Robustness for Deep Learning Backdoor Countermeasures. 455-468 - Yaqing Song, Chunxiang Xu, Yuan Zhang, Shiyu Li:
Hardening Password-Based Credential Databases. 469-484 - Junjiang He, Cong Tang, Wenshan Li, Tao Li, Li Chen, Xiaolong Lan:
BR-HIDF: An Anti-Sparsity and Effective Host Intrusion Detection Framework Based on Multi-Granularity Feature Extraction. 485-499 - Chao Liu, Xue Fu, Yu Wang, Lantu Guo, Yuchao Liu, Yun Lin, Haitao Zhao, Guan Gui:
Overcoming Data Limitations: A Few-Shot Specific Emitter Identification Method Using Self-Supervised Learning and Adversarial Augmentation. 500-513 - Suvadeep Hajra, Manaar Alam, Sayandeep Saha, Stjepan Picek, Debdeep Mukhopadhyay:
On the Instability of Softmax Attention-Based Deep Learning Models in Side-Channel Analysis. 514-528 - Dinu Coltuc, Henri George Coanda:
Reversible Contrast Enhancement by Histogram Specification and Very Low Distortion Data Hiding. 529-539 - Yunfei Ge, Quanyan Zhu:
GAZETA: GAme-Theoretic ZEro-Trust Authentication for Defense Against Lateral Movement in 5G IoT Networks. 540-554 - Baihao Peng, Junfeng Liu, Jun Zeng:
Dynamic Analysis of Multiplex Networks With Hybrid Maintenance Strategies. 555-570 - Sheema Madhusudhanan, Arun Cyril Jose, Jayakrushna Sahoo, Reza Malekian:
PRIMϵ: Novel Privacy-Preservation Model With Pattern Mining and Genetic Algorithm. 571-585 - Milos Grujic, Ingrid Verbauwhede:
Optimizing Linear Correctors: A Tight Output Min-Entropy Bound and Selection Technique. 586-600 - Hanbiao Du, Zheng Che, Meng Shen, Liehuang Zhu, Jiankun Hu:
Breaking the Anonymity of Ethereum Mixing Services Using Graph Feature Learning. 616-631 - Ali Asghar Beigizad, Hadi Soleimany, Sara Zarei, Hamed Ramzanipour:
Linked Fault Analysis. 632-645 - William Briguglio, Waleed A. Yousef, Issa Traoré, Mohammad Mamun:
Federated Supervised Principal Component Analysis. 646-660 - Zhouyan Deng, Jiajia Liu, Yijie Xun, Junman Qin:
IdentifierIDS: A Practical Voltage-Based Intrusion Detection System for Real In-Vehicle Networks. 661-676 - Qi Xia, Isaac Amankona Obiri, Jianbin Gao, Hu Xia, Xiaosong Zhang, Kwame Omono Asamoah, Sandro Amofa:
PRIDN: A Privacy Preserving Data Sharing on Named Data Networking. 677-692 - Zekai Chen, Shengxing Yu, Mingyuan Fan, Ximeng Liu, Robert H. Deng:
Privacy-Enhancing and Robust Backdoor Defense for Federated Learning on Heterogeneous Data. 693-707 - Yu Guo, Yu Zhao, Saihui Hou, Cong Wang, Xiaohua Jia:
Verifying in the Dark: Verifiable Machine Unlearning by Using Invisible Backdoor Triggers. 708-721 - Ruidong Han, Huihui Gong, Siqi Ma, Juanru Li, Chang Xu, Elisa Bertino, Surya Nepal, Zhuo Ma, Jianfeng Ma:
A Credential Usage Study: Flow-Aware Leakage Detection in Open-Source Projects. 722-734 - Decheng Liu, Xinbo Gao, Chunlei Peng, Nannan Wang, Jie Li:
Universal Heterogeneous Face Analysis via Multi-Domain Feature Disentanglement. 735-747 - Ying He, Zhili Shen, Jingyu Hua, Qixuan Dong, Jiacheng Niu, Wei Tong, Xu Huang, Chen Li, Sheng Zhong:
Backdoor Attack Against Split Neural Network-Based Vertical Federated Learning. 748-763 - Menghao Zhang, Guanyu Li, Cheng Guo, Han Bao, Mingwei Xu, Hongxin Hu, Fenghua Li:
IMap: Toward a Fast, Scalable and Reconfigurable In-Network Scanner With Programmable Switches. 601-615 - Xiaohan Yuan, Jiqiang Liu, Bin Wang, Wei Wang, Bin Wang, Tao Li, Xiaobo Ma, Witold Pedrycz:
FedComm: A Privacy-Enhanced and Efficient Authentication Protocol for Federated Learning in Vehicular Ad-Hoc Networks. 777-792 - Hui Liu, Wenya Wang, Hao Sun, Anderson Rocha, Haoliang Li:
Robust Domain Misinformation Detection via Multi-Modal Feature Alignment. 793-806 - Elahe Vedadi, Yasaman Keshtkarjahromi, Hulya Seferoglu:
Efficient Coded Multi-Party Computation at Edge Networks. 807-820 - Yuqing Zhang, Zhaofeng Ma, Shoushan Luo, Pengfei Duan:
Dynamic Trust-Based Redactable Blockchain Supporting Update and Traceability. 821-834 - Qiuhua Wang, Chengyu Li, Tianyu Xia, Yizhi Ren, Dong Wang, Guoyan Zhang, Kim-Kwang Raymond Choo:
Optimal Selfish Mining-Based Denial-of-Service Attack. 835-850 - Xingming Long, Jie Zhang, Shuzhe Wu, Xin Jin, Shiguang Shan:
Dual Sampling Based Causal Intervention for Face Anti-Spoofing With Identity Debiasing. 851-862 - Huikai Shao, Chengcheng Liu, Xiaojiang Li, Dexing Zhong:
Privacy Preserving Palmprint Recognition via Federated Metric Learning. 878-891 - Yunchao Yang, Miao Hu, Yipeng Zhou, Xuezheng Liu, Di Wu:
CSRA: Robust Incentive Mechanism Design for Differentially Private Federated Learning. 892-906 - Yiming Xue, Jiaxuan Wu, Ronghua Ji, Ping Zhong, Juan Wen, Wanli Peng:
Adaptive Domain-Invariant Feature Extraction for Cross-Domain Linguistic Steganalysis. 920-933 - Jingwei Xin, Zikai Wei, Nannan Wang, Jie Li, Xinbo Gao:
Large Pose Face Recognition via Facial Representation Learning. 934-946 - Rossano Gaeta:
An Accurate and Efficient Algorithm to Identify Malicious Nodes of a Graph. 947-958 - Shuyi Li, Ruijun Ma, Jianhang Zhou, Bob Zhang, Lifang Wu:
Joint Discriminative Analysis With Low-Rank Projection for Finger Vein Feature Extraction. 959-969 - Wei Guo, Benedetta Tondi, Mauro Barni:
Universal Detection of Backdoor Attacks via Density-Based Clustering and Centroids Analysis. 970-984 - Haodi Wang, Yu Guo, Rongfang Bie, Xiaohua Jia:
Verifiable Arbitrary Queries With Zero Knowledge Confidentiality in Decentralized Storage. 1071-1085 - Anwei Luo, Chenqi Kong, Jiwu Huang, Yongjian Hu, Xiangui Kang, Alex C. Kot:
Beyond the Prior Forgery Knowledge: Mining Critical Clues for General Face Forgery Detection. 1168-1182 - Xiao Mei Zeng, Qing Liu, Chee Lip Gan:
A Comprehensive Data Retrieval and Correction Approach From 40-nm Flash Memory With Selective Chemical Engraving. 1031-1040 - Xinyu Qi, Aiqun Hu, Tianshu Chen:
Lightweight Radio Frequency Fingerprint Identification Scheme for V2X Based on Temporal Correlation. 1056-1070 - Chen Chen, Junqing Zhang, Tianyu Lu, Magnus Sandell, Liquan Chen:
Secret Key Generation for IRS-Assisted Multi-Antenna Systems: A Machine Learning-Based Approach. 1086-1098 - Weiqi Wang, Chenhan Zhang, Zhiyi Tian, Shui Yu:
Machine Unlearning via Representation Forgetting With Parameter Self-Sharing. 1099-1111 - Yuewang He, Xiangui Kang, Qiben Yan, Enping Li:
ResNeXt+: Attention Mechanisms Based on ResNeXt for Malware Detection and Classification. 1142-1155 - Guo-Wei Wong, Yi-Ting Huang, Ying-Ren Guo, Yeali S. Sun, Meng Chang Chen:
Attention-Based API Locating for Malware Techniques. 1199-1212 - Mingyue Wang, Zizhuo Chen, Yinbin Miao, Hejiao Huang, Cong Wang, Xiaohua Jia:
Cross-User Leakage Mitigation for Authorized Multi-User Encrypted Data Sharing. 1213-1226 - Shao-Chuan Zhao, Tianyang Xu, Xiaojun Wu, Josef Kittler:
Pluggable Attack for Visual Object Tracking. 1227-1240 - Mengqi Zhan, Yang Li, Bo Li, Jinchao Zhang, Chuanrong Li, Weiping Wang:
Toward Automated Field Semantics Inference for Binary Protocol Reverse Engineering. 764-776 - Roberto Casula, Giulia Orrù, Stefano Marrone, Umberto Gagliardini, Gian Luca Marcialis, Carlo Sansone:
Realistic Fingerprint Presentation Attacks Based on an Adversarial Approach. 863-877 - Yuni Lai, Yulin Zhu, Wenqi Fan, Xiaoge Zhang, Kai Zhou:
Toward Adversarially Robust Recommendation From Adaptive Fraudster Detection. 907-919 - Peng Xu, Jun Yang, Gaojie Chen, Zheng Yang, Yong Li, Moe Z. Win:
Physical-Layer Secret and Private Key Generation in Wireless Relay Networks With Correlated Eavesdropping Channels. 985-1000 - Wenze Mao, Peng Jiang, Liehuang Zhu:
Locally Verifiable Batch Authentication in IoMT. 1001-1014 - Taiyu Wang, Qinglin Yang, Kaiming Zhu, Junbo Wang, Chunhua Su, Kento Sato:
LDS-FL: Loss Differential Strategy Based Federated Learning for Privacy Preserving. 1015-1030 - Aakarsh Malhotra, Mayank Vatsa, Richa Singh, Keith B. Morris, Afzel Noore:
Multi-Surface Multi-Technique (MUST) Latent Fingerprint Database. 1041-1055 - Weiwei Feng, Nanqing Xu, Tianzhu Zhang, Baoyuan Wu, Yongdong Zhang:
Robust and Generalized Physical Adversarial Attacks via Meta-GAN. 1112-1125 - Durba Chatterjee, Kuheli Pratihar, Aritra Hazra, Ulrich Rührmair, Debdeep Mukhopadhyay:
Systematically Quantifying Cryptanalytic Nonlinearities in Strong PUFs. 1126-1141 - Hongwei Ding, Yu Sun, Nana Huang, Zhidong Shen, Xiaohui Cui:
TMG-GAN: Generative Adversarial Networks-Based Imbalanced Learning for Network Intrusion Detection. 1156-1167 - Dazhi Zhan, Yexin Duan, Yue Hu, Weili Li, Shize Guo, Zhisong Pan:
MalPatch: Evading DNN-Based Malware Detection With Adversarial Patches. 1183-1198 - Yuanchao Chen, Yuwei Li, Zulie Pan, Yuliang Lu, Juxing Chen, Shouling Ji:
URadar: Discovering Unrestricted File Upload Vulnerabilities via Adaptive Dynamic Testing. 1251-1266 - Changsheng Chen, Bokang Li, Rizhao Cai, Jishen Zeng, Jiwu Huang:
Distortion Model-Based Spectral Augmentation for Generalized Recaptured Document Detection. 1283-1298 - Bei Gong, Chong Guo, Chong Guo, Chen Guo, Yao Sun, Muhammad Waqas, Sheng Chen:
SLIM: A Secure and Lightweight Multi-Authority Attribute-Based Signcryption Scheme for IoT. 1299-1312 - Yunhao Du, Cheng Lei, Zhicheng Zhao, Yuan Dong, Fei Su:
Video-Based Visible-Infrared Person Re-Identification With Auxiliary Samples. 1313-1325 - Elias N. Zois, Dimitrios Tsourounis, Dimitrios Kalivas:
Similarity Distance Learning on SPD Manifold for Writer Independent Offline Signature Verification. 1342-1356 - Zirui Gong, Liyue Shen, Yanjun Zhang, Leo Yu Zhang, Jingwei Wang, Guangdong Bai, Yong Xiang:
AgrAmplifier: Defending Federated Learning Against Poisoning Attacks Through Local Update Amplification. 1241-1250 - Kuofeng Gao, Jiawang Bai, Baoyuan Wu, Mengxi Ya, Shu-Tao Xia:
Imperceptible and Robust Backdoor Attack in 3D Point Cloud. 1267-1282 - Zhi Li, Hao Wang, Songnian Zhang, Wenying Zhang, Rongxing Lu:
SecKNN: FSS-Based Secure Multi-Party KNN Classification Under General Distance Functions. 1326-1341 - Jiajun Gong, Wuqi Zhang, Charles Zhang, Tao Wang:
WFDefProxy: Real World Implementation and Evaluation of Website Fingerprinting Defenses. 1357-1371 - Qige Song, Yafei Sang, Yongzheng Zhang, Shuhao Li, Xiaolin Xu:
SepBIN: Binary Feature Separation for Better Semantic Comparison and Authorship Verification. 1372-1387 - Leixiao Cheng, Fei Meng:
Server-Aided Public Key Authenticated Searchable Encryption With Constant Ciphertext and Constant Trapdoor. 1388-1400 - Yong Dong, Yinfei Xu, Tong Zhang, Yili Xia:
Optimality of the Proper Gaussian Signal in Complex MIMO Wiretap Channels. 1401-1414 - Yinfei Xu, Jian Lu, Xuan Guang, Wei Xu:
Information Embedding With Stegotext Reconstruction. 1415-1428 - Amir Mahdi Sadeghzadeh, Amir Mohammad Sobhanian, Faezeh Dehghan, Rasool Jalili:
HODA: Hardness-Oriented Detection of Model Extraction Attacks. 1429-1439 - Xiaoguo Li, Zixi Huang, Bowen Zhao, Guomin Yang, Tao Xiang, Robert H. Deng:
STDA: Secure Time Series Data Analytics With Practical Efficiency in Wide-Area Network. 1440-1454 - Tingting Lu, Junfeng Wang:
DOMR: Toward Deep Open-World Malware Recognition. 1455-1468 - Jinyoung Lee, Hyeonsik Yeom, Si-Hyeon Lee, Jeongseok Ha:
Channel Correlation in Multi-User Covert Communication: Friend or Foe? 1469-1482 - Niusen Chen, Bo Chen:
HiPDS: A Storage Hardware-Independent Plausibly Deniable Storage System. 1483-1495 - Hengmin Zhang, Jian Yang, Jianjun Qian, Guangwei Gao, Xiangyuan Lan, Zhiyuan Zha, Bihan Wen:
Efficient Image Classification via Structured Low-Rank Matrix Factorization Regression. 1496-1509 - Yang Liu, Guangbo Liang, Xi Wang, Peican Zhu, Zhen Wang:
Diffusion Containment in Complex Networks Through Collective Influence of Connections. 1510-1524 - Ni Yang, Ruiyi Gao, Youzhi Feng, Huan Su:
Event-Triggered Impulsive Control for Complex Networks Under Stochastic Deception Attacks. 1525-1534 - Hao Fang, Ajian Liu, Jun Wan, Sergio Escalera, Chenxu Zhao, Xu Zhang, Stan Z. Li, Zhen Lei:
Surveillance Face Anti-Spoofing. 1535-1546 - Jiefu Chen, Tong Chen, Xing Xu, Jingran Zhang, Yang Yang, Heng Tao Shen:
Coreset Learning-Based Sparse Black-Box Adversarial Attack for Video Recognition. 1547-1560 - Ashkan Esmaeili, Marzieh Edraki, Nazanin Rahnavard, Ajmal Mian, Mubarak Shah:
Low-Rank and Sparse Decomposition for Low-Query Decision-Based Adversarial Attacks. 1561-1575 - Xiaohan Hao, Chao Lin, Wenhan Dong, Xinyi Huang, Hui Xiong:
Robust and Secure Federated Learning Against Hybrid Attacks: A Generic Architecture. 1576-1588 - Peng Jiang, Qi Liu, Liehuang Zhu:
SanIdea: Exploiting Secure Blockchain-Based Access Control via Sanitizable Encryption. 1589-1600 - Houssem Jmal, Firas Ben Hmida, Nardine Basta, Muhammad Ikram, Mohamed Ali Kâafar, Andy Walker:
SPGNN-API: A Transferable Graph Neural Network for Attack Paths Identification and Autonomous Mitigation. 1601-1613 - Xinjun Pei, Xiaoheng Deng, Shengwei Tian, Jianqing Liu, Kaiping Xue:
Privacy-Enhanced Graph Neural Network for Decentralized Local Graphs. 1614-1629 - Adam Gronowski, William Paul, Fady Alajaji, Bahman Gharesifard, Philippe Burlina:
Classification Utility, Fairness, and Compactness via Tunable Information Bottleneck and Rényi Measures. 1630-1645 - Weihang Tan, Sin-Wei Chiu, Antian Wang, Yingjie Lao, Keshab K. Parhi:
PaReNTT: Low-Latency Parallel Residue Number System and NTT-Based Long Polynomial Modular Multiplication for Homomorphic Encryption. 1646-1659 - Kai Feng, Marco M. Cook, Angelos K. Marnerides:
Sizzler: Sequential Fuzzing in Ladder Diagrams for Vulnerability Detection and Discovery in Programmable Logic Controllers. 1660-1671 - Hodong Kim, Changhee Hahn, Hyunwoo J. Kim, Youngjoo Shin, Junbeom Hur:
Deep Learning-Based Detection for Multiple Cache Side-Channel Attacks. 1672-1686 - Junyu Quan, Qin Li, Lvzhou Li:
Verifiable Blind Quantum Computation With Identity Authentication for Multi-Type Clients. 1687-1698 - Huafeng Qin, Chao Fan, Shaojiang Deng, Yantao Li, Mounim A. El-Yacoubi, Gang Zhou:
AG-NAS: An Attention GRU-Based Neural Architecture Search for Finger-Vein Recognition. 1699-1713 - Dingzhao Li, Jie Qi, Shaohua Hong, Pengfei Deng, Haixin Sun:
A Class-Incremental Approach With Self-Training and Prototype Augmentation for Specific Emitter Identification. 1714-1727 - Mohammadhadi Shateri, Francisco Messina, Fabrice Labeau, Pablo Piantanida:
Preserving Privacy in GANs Against Membership Inference Attack. 1728-1743 - Chandra Sharma, George T. Amariucai, Shuangqing Wei:
The Economics of Privacy and Utility: Investment Strategies. 1744-1755 - Yangguang Tian, Bowen Liu, Yingjiu Li, Pawel Szalachowski, Jianying Zhou:
Accountable Fine-Grained Blockchain Rewriting in the Permissionless Setting. 1756-1766 - Bin Yang, Jun Chen, Cuiqun Chen, Mang Ye:
Dual Consistency-Constrained Learning for Unsupervised Visible-Infrared Person Re-Identification. 1767-1779 - Qiongxiu Li, Jaron Skovsted Gundersen, Milan Lopuhaä-Zwakenberg, Richard Heusdens:
Adaptive Differentially Quantized Subspace Perturbation (ADQSP): A Unified Framework for Privacy-Preserving Distributed Average Consensus. 1780-1793 - Nusrat Farzana Dipu, Avinash Ayalasomayajula, Mark M. Tehranipoor, Farimah Farahmandi:
AGILE: Automated Assertion Generation to Detect Information Leakage Vulnerabilities. 1794-1809 - Boyu Zhu, Changyu Dong, Yuan Zhang, Yunlong Mao, Sheng Zhong:
Toward Universal Detection of Adversarial Examples via Pseudorandom Classifiers. 1810-1825 - Maoguo Gong, Yuanqiao Zhang, Yuan Gao, A. Kai Qin, Yue Wu, Shanfeng Wang, Yihong Zhang:
A Multi-Modal Vertical Federated Learning Framework Based on Homomorphic Encryption. 1826-1839 - Ishan Karunanayake, Jiaojiao Jiang, Nadeem Ahmed, Sanjay K. Jha:
Exploring Uncharted Waters of Website Fingerprinting. 1840-1854 - Xuan Yang, Dongming Li:
LED-RFF: LTE DMRS-Based Channel Robust Radio Frequency Fingerprint Identification Scheme. 1855-1869 - Zhenqin Yin, Xinmin Zhang, Zhihuan Song, Zhiqiang Ge:
Adversarial Learning From Imbalanced Data: A Robust Industrial Fault Classification Method. 1870-1882 - Siguo Bi, Kai Li, Shuyan Hu, Wei Ni, Cong Wang, Xin Wang:
Detection and Mitigation of Position Spoofing Attacks on Cooperative UAV Swarm Formations. 1883-1895 - Tao Jing, Hongyan Huang, Qinghe Gao, Yue Wu, Yan Huo, Yawei Wang:
Multi-User Physical Layer Authentication Based on CSI Using ResNet in Mobile IIoT. 1896-1907 - Yuhan Suo, Senchun Chai, Runqi Chai, Zhong-Hua Pang, Yuanqing Xia, Guo-Ping Liu:
Security Defense of Large-Scale Networks Under False Data Injection Attacks: An Attack Detection Scheduling Approach. 1908-1921 - Jiawei Liu, Jingyi Xie, Yang Wang, Zheng-Jun Zha:
Adaptive Texture and Spectrum Clue Mining for Generalizable Face Forgery Detection. 1922-1934 - Junlong Mao, Huiyi Tang, Shanxiang Lyu, Zhengchun Zhou, Xiaochun Cao:
Content-Aware Quantization Index Modulation: Leveraging Data Statistics for Enhanced Image Watermarking. 1935-1947 - Meng Chen, Li Lu, Jiadi Yu, Zhongjie Ba, Feng Lin, Kui Ren:
AdvReverb: Rethinking the Stealthiness of Audio Adversarial Examples to Human Perception. 1948-1962 - Yuntao Wang, Zhou Su, Abderrahim Benslimane, Qichao Xu, Minghui Dai, Ruidong Li:
Collaborative Honeypot Defense in UAV Networks: A Learning-Based Game Approach. 1963-1978 - Chuan Zhang, Haojun Xuan, Tong Wu, Ximeng Liu, Guomin Yang, Liehuang Zhu:
Blockchain-Based Dynamic Time-Encapsulated Data Auditing for Outsourcing Storage. 1979-1993 - Jiajing Wu, Dan Lin, Qishuang Fu, Shuo Yang, Ting Chen, Zibin Zheng, Bowen Song:
Toward Understanding Asset Flows in Crypto Money Laundering Through the Lenses of Ethereum Heists. 1994-2009 - Kerem Ozfatura, Emre Ozfatura, Alptekin Küpçü, Deniz Gündüz:
Byzantines Can Also Learn From History: Fall of Centered Clipping in Federated Learning. 2010-2022 - Chen Liu, Bo Li, Jun Zhao, Weiwei Feng, Xudong Liu, Chunpei Li:
A2-CLM: Few-Shot Malware Detection Based on Adversarial Heterogeneous Graph Augmentation. 2023-2038 - Laura Crosara, Francesco Ardizzon, Stefano Tomasin, Nicola Laurenti:
Worst-Case Spoofing Attack and Robust Countermeasure in Satellite Navigation Systems. 2039-2050 - Fanliang Hu, Jian Shen, Pandi Vijayakumar:
Side-Channel Attacks Based on Multi-Loss Regularized Denoising AutoEncoder. 2051-2065 - Erez Danieli, Menachem Goldzweig, Moshe Avital, Itamar Levi:
Revealing the Secrets of Radio Embedded Systems: Extraction of Raw Information via RF. 2066-2081 - Ahmad Bazzi, Marwa Chafii:
Secure Full Duplex Integrated Sensing and Communications. 2082-2097 - Kutub Uddin, Yoonmo Yang, Tae Hyun Jeong, Byung Tae Oh:
A Robust Open-Set Multi-Instance Learning for Defending Adversarial Attacks in Digital Image. 2098-2111 - Yiming Yang, Weipeng Hu, Haifeng Hu:
Unsupervised NIR-VIS Face Recognition via Homogeneous-to-Heterogeneous Learning and Residual-Invariant Enhancement. 2112-2126 - Linkun Fan, Fazhi He, Tongzhen Si, Rubin Fan, Chuanlong Ye, Bing Li:
MBA: Backdoor Attacks Against 3D Mesh Classifier. 2127-2142 - Shengbang Fang, Matthew C. Stamm:
Attacking Image Splicing Detection and Localization Algorithms Using Synthetic Traces. 2143-2156 - Wenbing Tang, Yuan Zhou, Yang Liu, Zuohua Ding, Jing Liu:
Robust Motion Planning for Multi-Robot Systems Against Position Deception Attacks. 2157-2170 - Yuexin Xiang, Yuchen Lei, Ding Bao, Tiantian Li, Qingqing Yang, Wenmao Liu, Wei Ren, Kim-Kwang Raymond Choo:
BABD: A Bitcoin Address Behavior Dataset for Pattern Analysis. 2171-2185 - Ziyu Wei, Xi Yang, Nannan Wang, Xinbo Gao:
Dual-Adversarial Representation Disentanglement for Visible Infrared Person Re-Identification. 2186-2200 - Guowei Ling, Fei Tang, Chaochao Cai, Jinyong Shan, Haiyang Xue, Wulu Li, Peng Tang, Xinyi Huang, Weidong Qiu:
P²FRPSI: Privacy-Preserving Feature Retrieved Private Set Intersection. 2201-2216 - Meng Li, Hanni Ding, Qing Wang, Mingwei Zhang, Weizhi Meng, Liehuang Zhu, Zijian Zhang, Xiaodong Lin:
Decentralized Threshold Signatures With Dynamically Private Accountability. 2217-2230 - Jinguang Han, Willy Susilo, Nan Li, Xinyi Huang:
OLBS: Oblivious Location-Based Services. 2231-2243 - Zhenyu Guo, Xin Li, Jiamou Liu, Zijian Zhang, Meng Li, Jingjing Hu, Liehuang Zhu:
Graph-Based Covert Transaction Detection and Protection in Blockchain. 2244-2257 - Fahong Zhang, Chen Yang, Rui Zong, Xinran Zheng, Jianfei Wang, Yishuo Meng:
An Efficient and Scalable FHE-Based PDQ Scheme: Utilizing FFT to Design a Low Multiplication Depth Large-Integer Comparison Algorithm. 2258-2272 - Zongkun Sun, Yanzhen Ren, Yihuan Huang, Wuyang Liu, Hongcheng Zhu:
AFPM: A Low-Cost and Universal Adversarial Defense for Speaker Recognition Systems. 2273-2287 - Jianchang Lai, Willy Susilo, Robert H. Deng, Fuchun Guo:
SDSS: Sequential Data Sharing System in IoT. 2288-2299 - Liang Guo, Jie Jia, Jian Chen, Xingwei Wang:
Secure Communication Optimization in NOMA Systems With UAV-Mounted STAR-RIS. 2300-2314 - Rui Gao, Jiangshuai Huang, Xiaojie Su, Ling Zhao:
Adaptive Control of Strict-Feedback Nonlinear Systems Under Denial-of-Service: A Synthetic Analysis. 2315-2327 - Weidong Liu, Xiaojun Mao, Xiaofei Zhang, Xin Zhang:
Efficient Sparse Least Absolute Deviation Regression With Differential Privacy. 2328-2339 - Yanbin Li, Jiajie Zhu, Zhe Liu, Ming Tang, Shougang Ren:
Deep Learning Gradient Visualization-Based Pre-Silicon Side-Channel Leakage Location. 2340-2355 - Haochen Dou, Zhenwu Dan, Peng Xu, Wei Wang, Shuning Xu, Tianyang Chen, Hai Jin:
Dynamic Searchable Symmetric Encryption With Strong Security and Robustness. 2370-2384 - Ting Cui, Yiming Mao, Yang Yang, Yi Zhang, Jiyan Zhang, Chenhui Jin:
Congruent Differential Cluster for Binary SPN Ciphers. 2385-2397 - Xiaoxue Hu, Geling Liu, Baolin Zheng, Lingchen Zhao, Qian Wang, Yufei Zhang, Minxin Du:
FastTextDodger: Decision-Based Adversarial Attack Against Black-Box NLP Models With Extremely High Efficiency. 2398-2411 - Jian Chen, Yuan Gao, Gaoyang Liu, Ahmed M. Abdelmoniem, Chen Wang:
Manipulating Pre-Trained Encoder for Targeted Poisoning Attacks in Contrastive Learning. 2412-2424 - Weiqi Dai, Jinkai Liu, Yang Zhou, Kim-Kwang Raymond Choo, Xia Xie, Deqing Zou, Hai Jin:
PRBFPT: A Practical Redactable Blockchain Framework With a Public Trapdoor. 2425-2437 - Xiaohu Wang, Chao Lin, Xinyi Huang, Debiao He:
Anonymity-Enhancing Multi-Hop Locks for Monero-Enabled Payment Channel Networks. 2438-2453 - Na Wang, Wen Zhou, Jingjing Wang, Yifan Guo, Junsong Fu, Jianwei Liu:
Secure and Efficient Similarity Retrieval in Cloud Computing Based on Homomorphic Encryption. 2454-2469 - Jiajun Li, Pu Wang, Zheng Yan, Yishan Yang, Kai Zeng:
BGKey: Group Key Generation for Backscatter Communications Among Multiple Devices. 2470-2486 - Jueun Jeon, Byeonghui Jeong, Seungyeon Baek, Young-Sik Jeong:
Static Multi Feature-Based Malware Detection Using Multi SPP-net in Smart IoT Environments. 2487-2500 - Yu Wei, Jingyu Jia, Yuduo Wu, Changhui Hu, Changyu Dong, Zheli Liu, Xiaofeng Chen, Yun Peng, Shaowei Wang:
Distributed Differential Privacy via Shuffling Versus Aggregation: A Curious Study. 2501-2516 - Xiaoli Zhang, Wenxiang Sun, Zhicheng Xu, Hongbing Cheng, Chengjun Cai, Helei Cui, Qi Li:
EVM-Shield: In-Contract State Access Control for Fast Vulnerability Detection and Prevention. 2517-2532 - Huaibing Peng, Huming Qiu, Hua Ma, Shuo Wang, Anmin Fu, Said F. Al-Sarawi, Derek Abbott, Yansong Gao:
On Model Outsourcing Adaptive Attacks to Deep Learning Backdoor Defenses. 2356-2369 - Tianyu Zhaolu, Zhiguo Wan, Huaqun Wang:
Division of Regulatory Power: Collaborative Regulation for Privacy-Preserving Blockchains. 2533-2548 - Meng Jia, Jing Chen, Kun He, Min Shi, Yuanzheng Wang, Ruiying Du:
Generic Construction of Threshold Credential Management With User-Autonomy Aggregation. 2549-2564 - Lifeng Huang, Qiong Huang, Peichao Qiu, Shuxin Wei, Chengying Gao:
FASTEN: Fast Ensemble Learning for Improved Adversarial Robustness. 2565-2580 - Guoyuan Lin, Weiqi Luo, Da Luo, Jiwu Huang:
One-Class Neural Network With Directed Statistics Pooling for Spoofing Speech Detection. 2581-2593 - Jianhao Li, Jiabei Wang, Rui Zhang, Yansen Xin, Wenhan Xu:
NEMO: Practical Distributed Boolean Queries With Minimal Leakage. 2594-2608 - Jian Liu, Jiachen Ke, Jinliang Liu, Xiangpeng Xie, Engang Tian:
Outlier-Resistant Non-Fragile Control of Nonlinear Networked Systems Under DoS Attacks and Multi-Variable Event-Triggered SC Protocol. 2609-2622 - Zhenqing Qu, Xiang Ling, Ting Wang, Xiang Chen, Shouling Ji, Chunming Wu:
AdvSQLi: Generating Adversarial SQL Injections Against Real-World WAF-as-a-Service. 2623-2638 - Yibin Zhang, Qianyun Zhang, Haitao Zhao, Yun Lin, Guan Gui, Hikmet Sari:
Multisource Heterogeneous Specific Emitter Identification Using Attention Mechanism-Based RFF Fusion Method. 2639-2650 - Barak Amihood, Asaf Cohen:
Covertly Controlling a Linear System. 2651-2663 - Janith Kavindu Dassanayake, Dulaj Gunasinghe, Gayan Amarasuriya Aruma Baduge:
Secrecy Rate Analysis and Active Pilot Attack Detection for IRS-Aided Massive MIMO Systems. 2664-2679 - Raymond K. Zhao, Sarah McCarthy, Ron Steinfeld, Amin Sakzad, Máire O'Neill:
Quantum-Safe HIBE: Does It Cost a Latte? 2680-2695 - Zhenyu Cui, Jiahuan Zhou, Yuxin Peng:
DMA: Dual Modality-Aware Alignment for Visible-Infrared Person Re-Identification. 2696-2708 - Shuyi Li, Bob Zhang, Lifang Wu, Ruijun Ma, Xin Ning:
Robust and Sparse Least Square Regression for Finger Vein and Finger Knuckle Print Recognition. 2709-2719 - Haotian Wang, Jun Tao, Dingwen Chi, Yu Gao, Zuyan Wang, Dika Zou, Yifan Xu:
A Preference-Driven Malicious Platform Detection Mechanism for Users in Mobile Crowdsensing. 2720-2731 - Jun Zhao, Kai Zhang, Junqing Gong, Haifeng Qian:
Lavida: Large-Universe, Verifiable, and Dynamic Fine-Grained Access Control for E-Health Cloud. 2732-2745 - Qiuyun Tong, Xinghua Li, Yinbin Miao, Yunwei Wang, Ximeng Liu, Robert H. Deng:
Beyond Result Verification: Efficient Privacy-Preserving Spatial Keyword Query With Suppressed Leakage. 2746-2760 - Mei Jiang, Yannan Li, Willy Susilo, Dung Hoang Duong:
Quantum-Safe Puncturable Signatures With Their Application in Blockchain. 2761-2770 - Kimia Zamiri Azar, Hadi Mardani Kamali, Farimah Farahmandi, Mark M. Tehranipoor:
Improving Bounded Model Checkers Scalability for Circuit De-Obfuscation: An Exploration. 2771-2785 - Alejandro Cohen, Asaf Cohen, Omer Gurewitz:
Secure Adaptive Group Testing. 2786-2799 - Rui Sun, Long Chen, Lei Zhang, Ruirui Xie, Jun Gao:
Robust Visible-Infrared Person Re-Identification Based on Polymorphic Mask and Wavelet Graph Convolutional Network. 2800-2813 - Weixuan Tang, Zhili Zhou, Bin Li, Kim-Kwang Raymond Choo, Jiwu Huang:
Joint Cost Learning and Payload Allocation With Image-Wise Attention for Batch Steganography. 2826-2839 - Mang Ye, Wei Shen, Junwu Zhang, Yao Yang, Bo Du:
SecureReID: Privacy-Preserving Anonymization for Person Re-Identification. 2840-2853 - Adrián Tobar Nicolau, Javier Parra-Arnau, Jordi Forné, Esteve Pallarès:
m-Eligibility With Minimum Counterfeits and Deletions for Privacy Protection in Continuous Data Publishing. 2854-2864 - Rui Zhang, Lei Zhang, Qian Wu, Jianying Zhou:
Secure Channel Establishment Scheme for Task Delivery in Vehicular Cloud Computing. 2865-2880 - Junlin Liu, Xinchen Lyu, Qimei Cui, Xiaofeng Tao:
Similarity-Based Label Inference Attack Against Training and Inference of Split Learning. 2881-2895 - Huy Nguyen, Kien Nguyen Thanh, Sridha Sridharan, Clinton Fookes:
AG-ReID.v2: Bridging Aerial and Ground Views for Person Re-Identification. 2896-2908 - Enas E. Abulibdeh, Leen Younes, Baker Mohammad, Khaled Humood, Hani H. Saleh, Mahmoud Al-Qutayri:
DRAM-Based PUF Utilizing the Variation of Adjacent Cells. 2909-2918 - Fucai Luo, Haiyan Wang, Willy Susilo, Xingfu Yan, Xiaofan Zheng:
Public Trace-and-Revoke Proxy Re-Encryption for Secure Data Sharing in Clouds. 2919-2934 - Runmeng Du, Xuru Li, Daojing He, Kim-Kwang Raymond Choo:
Toward Secure and Verifiable Hybrid Federated Learning. 2935-2950 - He Yang, Wei Xi, Yuhao Shen, Canhui Wu, Jizhong Zhao:
RoseAgg: Robust Defense Against Targeted Collusion Attacks in Federated Learning. 2951-2966 - Haozhe Li, Yilin Liao, Zijian Tian, Zhaoran Liu, Jiaqi Liu, Xinggao Liu:
Bidirectional Stackable Recurrent Generative Adversarial Imputation Network for Specific Emitter Missing Data Imputation. 2967-2980 - Norbert Tihanyi, Tamás Bisztray, Bertalan Borsos, Sebastien Raveau:
Privacy-Preserving Password Cracking: How a Third Party Can Crack Our Password Hash Without Learning the Hash Value or the Cleartext. 2981-2996 - Ying Liang, Wenjie Wu, Haobo Li, Xiaojun Chang, Xiaojiang Chen, Jinye Peng, Pengfei Xu:
DCS-Gait: A Class-Level Domain Adaptation Approach for Cross-Scene and Cross-State Gait Recognition Using Wi-Fi CSI. 2997-3007 - Mingxing Duan, Kailun Jiao, Siyang Yu, Zhibang Yang, Bin Xiao, Kenli Li:
MC-Net: Realistic Sample Generation for Black-Box Attacks. 3008-3022 - Jieli Liu, Jinze Chen, Jiajing Wu, Zhiying Wu, Junyuan Fang, Zibin Zheng:
Fishing for Fraudsters: Uncovering Ethereum Phishing Gangs With Blockchain Data. 3038-3050 - Min Long, Quantao Yao, Le-Bing Zhang, Fei Peng:
Face De-Morphing Based on Diffusion Autoencoders. 3051-3063 - Yuanyuan Qing, Tao Bai, Zhuotao Liu, Pierre Moulin, Bihan Wen:
Detection of Adversarial Attacks via Disentangling Natural Images and Perturbations. 2814-2825 - Zhankai Li, Weiping Wang, Jie Li, Kai Chen, Shigeng Zhang:
UCG: A Universal Cross-Domain Generator for Transferable Adversarial Examples. 3023-3037 - Yun Wen, Gaojie Chen, Sisai Fang, Miaowen Wen, Stefano Tomasin, Marco Di Renzo:
RIS-Assisted UAV Secure Communications With Artificial Noise-Aware Trajectory Design Against Multiple Colluding Curious Users. 3064-3076 - Chuan Sheng, Yu Yao, Lianxiang Zhao, Peng Zeng, Jianming Zhao:
Scanner-Hunter: An Effective ICS Scanning Group Identification System. 3077-3092 - Fangling Jiang, Yunfan Liu, Haolin Si, Jingjing Meng, Qi Li:
Cross-Scenario Unknown-Aware Face Anti-Spoofing With Evidential Semantic Consistency Learning. 3093-3108 - Baojin Huang, Zhongyuan Wang, Jifan Yang, Zhen Han, Chao Liang:
Unlabeled Data Assistant: Improving Mask Robustness for Face Recognition. 3109-3123 - Joakim Tutt, Olga Taran, Roman Chaban, Brian Pulfer, Yury Belousov, Taras Holotyak, Slava Voloshynovskiy:
Authentication of Copy Detection Patterns: A Pattern Reliability Based Approach. 3124-3134 - Shuai Li, Zhemin Yang, Yunteng Yang, Dingyi Liu, Min Yang:
Identifying Cross-User Privacy Leakage in Mobile Mini-Apps at a Large Scale. 3135-3147 - Xin Zhang, Kejiang Chen, Jinyang Ding, Yuqi Yang, Weiming Zhang, Nenghai Yu:
Provably Secure Public-Key Steganography Based on Elliptic Curve Cryptography. 3148-3163 - Shenyi Zhang, Baolin Zheng, Peipei Jiang, Lingchen Zhao, Chao Shen, Qian Wang:
Perception-Driven Imperceptible Adversarial Attack Against Decision-Based Black-Box Models. 3164-3177 - Andi Liu, Yizhong Liu, Qianhong Wu, Boyu Zhao, Dongyu Li, Yuan Lu, Rongxing Lu, Willy Susilo:
CHERUBIM: A Secure and Highly Parallel Cross-Shard Consensus Using Quadruple Pipelined Two-Phase Commit for Sharding Blockchains. 3178-3193 - Mohamed K. M. Fadul, Donald R. Reising, Lakmali P. Weerasena, T. Daniel Loveless, Mina Sartipi, Joshua H. Tyler:
Improving RF-DNA Fingerprinting Performance in an Indoor Multipath Environment Using Semi-Supervised Learning. 3194-3209 - Mengnan Zhao, Lihe Zhang, Wei Wang, Yuqiu Kong, Baocai Yin:
Adversarial Attacks on Scene Graph Generation. 3210-3225 - Daolin Wen, Xiaowu Mu:
Secure Dual Asynchronous Tracking Control for Markov Jump Systems Under Hybrid Cyberattacks. 3226-3236 - Kai Zeng, Kejiang Chen, Jiansong Zhang, Weiming Zhang, Nenghai Yu:
Toward Secure and Robust Steganography for Black-Box Generated Images. 3237-3250 - Tiong-Sik Ng, Jacky Chen Long Chai, Cheng-Yaw Low, Andrew Beng Jin Teoh:
Self-Attentive Contrastive Learning for Conditioned Periocular and Face Biometrics. 3251-3264 - Yulong Yang, Chenhao Lin, Qian Li, Zhengyu Zhao, Haoran Fan, Dawei Zhou, Nannan Wang, Tongliang Liu, Chao Shen:
Quantization Aware Attack: Enhancing Transferable Adversarial Attacks by Model Quantization. 3265-3278 - Peng Xu, Gaojie Chen, Zheng Yang, Yong Li, Stefano Tomasin:
Multiple Access Wiretap Channel With Partial Rate-Limited Feedback. 3279-3294 - Dayong Ye, Tianqing Zhu, Kun Gao, Wanlei Zhou:
Defending Against Label-Only Attacks via Meta-Reinforcement Learning. 3295-3308 - Jia-Si Weng, Shenglong Yao, Yuefeng Du, Junjie Huang, Jian Weng, Cong Wang:
Proof of Unlearning: Definitions and Instantiation. 3309-3323 - Xingyu Chen, Huici Wu, Xiaofeng Tao, Haowei Wang:
Polar Coding for Wiretap Channels With Random States Non-Causally Available at the Encoder. 3324-3338 - Qing Yang, Cheng Wang, Haifeng Yuan, Jipeng Cui, Hu Teng, Xue Chen, Changjun Jiang:
Approaching the Information-Theoretic Limit of Privacy Disclosure With Utility Guarantees. 3339-3352 - Tolun Tosun, Erkay Savas:
Zero-Value Filtering for Accelerating Non-Profiled Side-Channel Attack on Incomplete NTT-Based Implementations of Lattice-Based Cryptography. 3353-3365 - Xiaoyu Ji, Qinhong Jiang, Chaohao Li, Zhuoyang Shi, Wenyuan Xu:
Watch Your Speed: Injecting Malicious Voice Commands via Time-Scale Modification. 3366-3379 - Zhuo Chen, Liehuang Zhu, Peng Jiang, Can Zhang, Feng Gao, Fuchun Guo:
Exploring Unobservable Blockchain-Based Covert Channel for Censorship-Resistant Systems. 3380-3394 - Yury Belousov, Guillaume Quétant, Brian Pulfer, Roman Chaban, Joakim Tutt, Olga Taran, Taras Holotyak, Slava Voloshynovskiy:
A Machine Learning-Based Digital Twin for Anti-Counterfeiting Applications With Copy Detection Patterns. 3395-3408 - Ruiyang Xia, Decheng Liu, Jie Li, Lin Yuan, Nannan Wang, Xinbo Gao:
MMNet: Multi-Collaboration and Multi-Supervision Network for Sequential Deepfake Detection. 3409-3422 - Songlin Hu, Xiaohua Ge, Wei Zhang, Dong Yue:
DoS-Resilient Load Frequency Control of Multi-Area Power Systems: An Attack-Parameter-Dependent Approach. 3423-3434 - Pengyu Qiu, Xuhong Zhang, Shouling Ji, Chong Fu, Xing Yang, Ting Wang:
HashVFL: Defending Against Data Reconstruction Attacks in Vertical Federated Learning. 3435-3450 - Dong Xie, Jinghua Yang, Bin Wu, Weixin Bian, Fulong Chen, Taochun Wang:
An Effectively Applicable to Resource Constrained Devices and Semi-Trusted Servers Authenticated Key Agreement Scheme. 3451-3464 - Kai Li, Jingjing Zheng, Xin Yuan, Wei Ni, Özgür B. Akan, H. Vincent Poor:
Data-Agnostic Model Poisoning Against Federated Learning: A Graph Autoencoder Approach. 3465-3480 - Jiahui Wu, Weizhe Zhang, Fucai Luo:
On the Security of "LSFL: A Lightweight and Secure Federated Learning Scheme for Edge Computing". 3481-3482
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.